Intelligent privacy preservation proctol in wireless MANET for IoT applications using hybrid crow search-harris hawks optimization
Mobile Ad-Hoc Networks (MANETs) are useful and appropriate, especially for complex scenarios, including law, military enforcement as well disaster recovery, and emergency rescue. Among different cryptographic algorithms, there is a chance of data hacking according to random key generation. The major...
Saved in:
| Published in: | Wireless networks Vol. 28; no. 6; pp. 2713 - 2729 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York
Springer US
01.08.2022
Springer Nature B.V |
| Subjects: | |
| ISSN: | 1022-0038, 1572-8196 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Mobile Ad-Hoc Networks (MANETs) are useful and appropriate, especially for complex scenarios, including law, military enforcement as well disaster recovery, and emergency rescue. Among different cryptographic algorithms, there is a chance of data hacking according to random key generation. The major purpose of this work is to plan and implement a new security protocol in MANET that is applicable for IoT platforms. The approach focused on this research is the modified chaotic map for encryption and decryption to deal with MANET and IoT data. The privacy preservation model is designed with a suggested cryptographic algorithm for enhancing the privacy and security of the MANET and IoT. An enhanced chaotic map is developed for processing the key generation that maintains the encryption and decryption process and prevents the loss of data while recovering the data. The adaptive key management strategy under the chaotic map is developed in this paper using a hybrid meta-heuristic algorithm named Crow Harris Hawks Search Optimization (CHHSO). Finally, the security analysis and performance evaluation in comparison is made in terms of “statistical analysis, convergence analysis, and communication overhead” that show the improved performance of the proposed model. |
|---|---|
| AbstractList | Mobile Ad-Hoc Networks (MANETs) are useful and appropriate, especially for complex scenarios, including law, military enforcement as well disaster recovery, and emergency rescue. Among different cryptographic algorithms, there is a chance of data hacking according to random key generation. The major purpose of this work is to plan and implement a new security protocol in MANET that is applicable for IoT platforms. The approach focused on this research is the modified chaotic map for encryption and decryption to deal with MANET and IoT data. The privacy preservation model is designed with a suggested cryptographic algorithm for enhancing the privacy and security of the MANET and IoT. An enhanced chaotic map is developed for processing the key generation that maintains the encryption and decryption process and prevents the loss of data while recovering the data. The adaptive key management strategy under the chaotic map is developed in this paper using a hybrid meta-heuristic algorithm named Crow Harris Hawks Search Optimization (CHHSO). Finally, the security analysis and performance evaluation in comparison is made in terms of “statistical analysis, convergence analysis, and communication overhead” that show the improved performance of the proposed model. |
| Author | Pamarthi, Satyanarayana Narmadha, R. |
| Author_xml | – sequence: 1 givenname: Satyanarayana surname: Pamarthi fullname: Pamarthi, Satyanarayana email: satya.sp14@gmail.com organization: Department of Electronics and Communication Engineering, Sathyabama Institute of Science and Technology – sequence: 2 givenname: R. surname: Narmadha fullname: Narmadha, R. organization: Department of Electronics and Communication Engineering, Sathyabama Institute of Science and Technology |
| BookMark | eNp9kMtqHDEQRUWwIX79gFeCrDspqZ9aGuMkA3aymaxFtbp6Rk5bmkgaD-1lvjxyTyCQhRdFldA99bjn7MR5R4xdC_goANpPUQjZNgVImUN1TTG_Y2eibmXRCdWc5Hr5grJ7z85jfASArlTqjP1euUTTZDfkEt8F-4xmzpkihWdM1rv88Cb5iVvHDzbQRDHyh5tvd2s--sBXfs1xt5usWdSR76N1G76d-2AHboI_8EgYzLbYYgg28i0efkbud8k-2ZeFuWSnI06Rrv7mC_bj89369mtx__3L6vbmvjCyUqloq0HVakA1lh21CiugQUEthTLYjJI6EDAIxLqnGkw_NNj3osSqBIV1RWV5wT4c--aLfu0pJv3o98HlkVo2HVRVA43MKnlU5d1jDDTq7MoThlkL0K9e66PXOhuqF6_1nKHuP8jYtByXAtrpbbQ8ojHPcRsK_7Z6g_oD6RKZrg |
| CitedBy_id | crossref_primary_10_1016_j_comcom_2022_12_006 crossref_primary_10_3233_JIFS_232924 |
| Cites_doi | 10.1109/TNSE.2020.2970767 10.1007/s11277-017-4923-7 10.1007/s10776-017-0373-0 10.1007/s11277-021-09039-1 10.1016/j.comnet.2020.107743 10.3390/s21237793 10.1016/j.adhoc.2019.102022 10.1007/s10586-019-03028-7 10.1007/s11042-019-7617-1 10.1007/s11227-013-0920-0 10.1109/ACCESS.2020.2990932 10.1007/s11277-017-4713-2 10.1007/s12083-020-01038-6 10.1016/j.future.2021.01.028 10.1109/ACCESS.2020.2991543 10.1016/j.pmcj.2018.01.006 10.1007/s11277-020-07251-z 10.1007/s11277-020-07105-8 10.1007/s11276-021-02850-5 10.1007/s10916-018-1050-2 10.1109/JIOT.2019.2939286 10.1007/s11276-015-1135-5 10.1007/s11235-017-0352-x 10.1108/ijius-05-2021-0028 10.1007/s12652-020-02076-x 10.1109/TII.2019.2960275 10.1007/s13369-020-04896-7 10.1007/s10207-020-00535-2 10.1007/s11036-019-01448-8 10.1007/s13198-021-01173-0 10.1109/JIOT.2019.2944007 10.1007/s11227-019-03003-4 10.1109/ETI4.051663.2021.9619420 10.1109/CAOL46282.2019.9019583 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022. |
| DBID | AAYXX CITATION 3V. 7SC 7SP 7WY 7WZ 7XB 87Z 88I 8AO 8FD 8FE 8FG 8FK 8FL ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ HCIFZ JQ2 K60 K6~ L.- L7M L~C L~D M0C M2P P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI PRINS Q9U |
| DOI | 10.1007/s11276-022-02986-y |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts Electronics & Communications Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Science Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials - QC ProQuest Central Business Premium Collection ProQuest Technology Collection ProQuest One Community College ProQuest Central Korea Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Collection (ProQuest) ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Collection (ProQuest) Science Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic |
| DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Pharma Collection ProQuest Central China ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Science Journals (Alumni Edition) ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Science Journals ProQuest One Academic Eastern Edition Electronics & Communications Abstracts ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest Central (Alumni) ProQuest One Academic (New) Business Premium Collection (Alumni) |
| DatabaseTitleList | ABI/INFORM Global (Corporate) |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central Database Suite (ProQuest) url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1572-8196 |
| EndPage | 2729 |
| ExternalDocumentID | 10_1007_s11276_022_02986_y |
| GroupedDBID | -59 -5G -BR -EM -ET -Y2 -~C -~X .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29R 29~ 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3V. 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 85S 88I 8AO 8FE 8FG 8FL 8FW 8TC 8UJ 8US 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAHTB AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABGDV ABHFT ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABPEJ ABQBU ABQSL ABSXP ABTAH ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACGOD ACHSB ACHXU ACKNC ACM ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADL ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWIH AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGWIL AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARAPS ARCEE ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EBLON EBS EDO EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GROUPED_ABI_INFORM_RESEARCH GXS H13 HCIFZ HF~ HG5 HG6 HGAVV HMJXF HQYDN HRMNR HVGLF HZ~ I-F I07 I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6~ KDC KOV KOW KZ1 LAK LLZTM M0C M2P M4Y MA- N2Q NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PT4 PT5 Q2X QF4 QM1 QN7 QO4 QOK QOS R4E R89 R9I RHV RIG RNI ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCO SCV SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TAE TEORI TN5 TSG TSK TSV TUC TUS U2A U5U UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 W7O WK8 YIN YLTOR Z45 Z7R Z7X Z7Z Z83 Z88 Z8M Z8R Z8T Z8W Z92 ZMTXR ZY4 _50 ~A9 ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AETEA AEZWR AFDZB AFFHD AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB 7SC 7SP 7XB 8FD 8FK JQ2 L.- L7M L~C L~D PKEHL PQEST PQUKI PRINS Q9U |
| ID | FETCH-LOGICAL-c249t-74d959da9f38e79a40ed905219ca6f2e8010d1aa5be50cbd6abb13a4309a54e33 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 2 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000801195100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1022-0038 |
| IngestDate | Wed Nov 05 06:25:42 EST 2025 Sat Nov 29 04:44:25 EST 2025 Tue Nov 18 21:41:59 EST 2025 Fri Feb 21 02:46:10 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 6 |
| Keywords | Privacy preservation proctol Adaptive key management strategy Optimal key generation Wireless mobile ad-hoc networks Crow Harris Hawks search optimization |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c249t-74d959da9f38e79a40ed905219ca6f2e8010d1aa5be50cbd6abb13a4309a54e33 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2680446062 |
| PQPubID | 26318 |
| PageCount | 17 |
| ParticipantIDs | proquest_journals_2680446062 crossref_primary_10_1007_s11276_022_02986_y crossref_citationtrail_10_1007_s11276_022_02986_y springer_journals_10_1007_s11276_022_02986_y |
| PublicationCentury | 2000 |
| PublicationDate | 20220800 2022-08-00 20220801 |
| PublicationDateYYYYMMDD | 2022-08-01 |
| PublicationDate_xml | – month: 8 year: 2022 text: 20220800 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationSubtitle | The Journal of Mobile Communication, Computation and Information |
| PublicationTitle | Wireless networks |
| PublicationTitleAbbrev | Wireless Netw |
| PublicationYear | 2022 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | Sudhakar, Rao, M. (CR30) 2020; 23 Bhati, Venkataram (CR16) 2017; 97 Jenefa, Anita (CR18) 2018; 98 Chikouche, Cayrel, Mboup, Boidje (CR3) 2019; 75 Bhati, Venkataram (CR17) 2018; 25 Deebak, Al-Turjmanb (CR23) 2020; 97 CR39 Aman, Basheer, Sikdar (CR12) 2019; 6 Yankson (CR24) 2021; 20 Fragkos (CR11) 2021; 18 Lalos, Vlachos, Berberidis, Fournaris, Koulamas (CR10) 2020; 16 Ghosh, Ahmed, Singh, Geem, Sarkar (CR38) 2020; 8 Xu, He, Xu, Qi, Wan, Bhuiyan (CR13) 2020; 7 Alamer (CR31) 2020 Punithavathi, Geetha (CR15) 2019; 78 Wu, Ma, Dai, Wang (CR2) 2021; 185 Kore, Patil (CR21) 2022; 28 Hwang, Hsiao (CR19) 2013; 66 Rao, Kamila (CR37) 2021; 12 Muthusenthil, Murugavalli (CR1) 2017; 23 Geetha, Suntheya, Srikanth (CR32) 2020; 113 CR29 Unnisa (CR35) 2022; 122 Loretta, Kavitha (CR6) 2021; 14 Satyanarayana, Narmadha (CR20) 2021; 124 Arumugam, Srimathi, Maurya, Joseph, Asokan, Poongodi, Algethami, Hamdi, Rauf (CR22) 2021; 21 Prakaash, Sivakumar (CR34) 2019; 11 Zhang, Zhou, Shih (CR36) 2020; 45 Devi, Sathyalakshmi, Subramanian (CR7) 2021 Unnisa, Tatineni (CR28) 2021; 122 Zhou, Wang, Tian, Jiang, Wang (CR9) 2020; 8 Xu, Liu, Xu, Wang, Wan, Yang (CR26) 2020; 25 Gheisari, Najafabadi, Alzubi, Gao, Wang, Abbasi, Castiglione (CR8) 2021; 123 Manjula, Datta (CR4) 2018; 44 Sharavanan, Sridharan, Kumar (CR5) 2018 Ullah, Shah, Wahid, Mehmood, Song (CR25) 2018; 67 Hema, Kuppusamy (CR33) 2020; 112 Dai, Li, Su, Chen, Xu, Fu (CR14) 2020; 7 Satyanarayana, Narmadha (CR27) 2021 R Geetha (2986_CR32) 2020; 113 AM Hema (2986_CR33) 2020; 112 AS Lalos (2986_CR10) 2020; 16 X Xu (2986_CR26) 2020; 25 MN Aman (2986_CR12) 2019; 6 I Ullah (2986_CR25) 2018; 67 N Unnisa (2986_CR28) 2021; 122 Y Zhang (2986_CR36) 2020; 45 P Punithavathi (2986_CR15) 2019; 78 KK Ghosh (2986_CR38) 2020; 8 BS Bhati (2986_CR17) 2018; 25 PT Sharavanan (2986_CR5) 2018 P Satyanarayana (2986_CR20) 2021; 124 B Yankson (2986_CR24) 2021; 20 AS Prakaash (2986_CR34) 2019; 11 GI Loretta (2986_CR6) 2021; 14 P Satyanarayana (2986_CR27) 2021 2986_CR39 X Xu (2986_CR13) 2020; 7 R Manjula (2986_CR4) 2018; 44 M Gheisari (2986_CR8) 2021; 123 G Fragkos (2986_CR11) 2021; 18 P Devi (2986_CR7) 2021 M Dai (2986_CR14) 2020; 7 A Kore (2986_CR21) 2022; 28 BD Deebak (2986_CR23) 2020; 97 N Chikouche (2986_CR3) 2019; 75 C Zhou (2986_CR9) 2020; 8 M Rao (2986_CR37) 2021; 12 J Jenefa (2986_CR18) 2018; 98 A Alamer (2986_CR31) 2020 Y Wu (2986_CR2) 2021; 185 R-J Hwang (2986_CR19) 2013; 66 N Unnisa (2986_CR35) 2022; 122 BS Bhati (2986_CR16) 2017; 97 2986_CR29 B Muthusenthil (2986_CR1) 2017; 23 RV Sudhakar (2986_CR30) 2020; 23 K Arumugam (2986_CR22) 2021; 21 |
| References_xml | – volume: 7 start-page: 2323 issue: 4 year: 2020 end-page: 2335 ident: CR14 article-title: A privacy preservation based scheme for task assignment in internet of things publication-title: IEEE Transactions on Network Science and Engineering doi: 10.1109/TNSE.2020.2970767 – volume: 98 start-page: 1383 year: 2018 end-page: 1411 ident: CR18 article-title: Secure vehicular communication using ID based signature scheme publication-title: Wireless Personal Communications doi: 10.1007/s11277-017-4923-7 – volume: 25 start-page: 30 year: 2018 end-page: 43 ident: CR17 article-title: Performance analysis of privacy protection system during data transfer in MANETs publication-title: International Journal of Wireless Information Networks doi: 10.1007/s10776-017-0373-0 – volume: 122 start-page: 3019 issue: 4 year: 2021 end-page: 3051 ident: CR28 article-title: Adaptive deep learning strategy with red deer algorithm for sparse channel estimation and hybrid precoding in millimeter wave massive MIMO-OFDM systems publication-title: Wireless Personal Communications. doi: 10.1007/s11277-021-09039-1 – volume: 12 start-page: 480 year: 2021 end-page: 494 ident: CR37 article-title: Cat Swarm Optimization based autonomous recovery from network partitioning in heterogeneous underwater wireless sensor network publication-title: International Journal of System Assurance Engineering and Management – ident: CR39 – volume: 185 start-page: 107743 year: 2021 ident: CR2 article-title: Deep learning for privacy preservation in autonomous moving platforms enhanced 5G heterogeneous networks publication-title: Computer Networks doi: 10.1016/j.comnet.2020.107743 – volume: 18 start-page: 1 issue: 1 year: 2021 end-page: 26 ident: CR11 article-title: Enhancing privacy in PUF-cash through multiple trusted third parties and reinforcement learning publication-title: ACM Journal on Emerging Technologies in Computing Systems (JETC) – volume: 21 start-page: 7793 issue: 23 year: 2021 ident: CR22 article-title: Federated transfer learning for authentication and privacy preservation using novel supportive twin delayed DDPG (S-TD3) algorithm for IIoT publication-title: Sensors doi: 10.3390/s21237793 – volume: 97 year: 2020 ident: CR23 article-title: A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks publication-title: Ad Hoc Networks doi: 10.1016/j.adhoc.2019.102022 – volume: 23 start-page: 2579 year: 2020 end-page: 2589 ident: CR30 article-title: Security aware index based quasi–identifier approach for privacy preservation of data sets for cloud applications publication-title: Cluster Computing doi: 10.1007/s10586-019-03028-7 – volume: 78 start-page: 25487 year: 2019 end-page: 25514 ident: CR15 article-title: Partial DCT-based cancelable biometric authentication with security and privacy preservation for IoT applications publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-019-7617-1 – volume: 66 start-page: 888 year: 2013 end-page: 906 ident: CR19 article-title: An anonymous distributed routing protocol in mobile ad-hoc networks publication-title: The Journal of Supercomputing doi: 10.1007/s11227-013-0920-0 – ident: CR29 – volume: 8 start-page: 81698 year: 2020 end-page: 81710 ident: CR9 article-title: A top-K query scheme with privacy preservation for intelligent vehicle network in mobile IoT publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2990932 – volume: 97 start-page: 4063 year: 2017 end-page: 4086 ident: CR16 article-title: Preserving data privacy during data transfer in MANETs publication-title: Wireless Personal Communications doi: 10.1007/s11277-017-4713-2 – volume: 11 start-page: 395 issue: 11 year: 2019 end-page: 399 ident: CR34 article-title: Data analytics and predictive modelling in the application of big data: A systematic review publication-title: Journal of Advanced Research in Dynamical and Control Systems – volume: 14 start-page: 821 year: 2021 end-page: 836 ident: CR6 article-title: Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment publication-title: Peer-to-Peer Networking and Applications doi: 10.1007/s12083-020-01038-6 – volume: 123 start-page: 1 year: 2021 end-page: 13 ident: CR8 article-title: OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2021.01.028 – volume: 8 start-page: 83548 year: 2020 end-page: 83560 ident: CR38 article-title: Improved binary sailfish optimizer based on adaptive β-hill climbing for feature selection publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2991543 – volume: 44 start-page: 58 year: 2018 end-page: 73 ident: CR4 article-title: A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs publication-title: Pervasive and Mobile Computing doi: 10.1016/j.pmcj.2018.01.006 – volume: 113 start-page: 747 year: 2020 end-page: 771 ident: CR32 article-title: Cloud integrated IoT enabled sensor network security: Research issues and solutions publication-title: Wireless Personal Communications doi: 10.1007/s11277-020-07251-z – volume: 112 start-page: 1339 year: 2020 end-page: 1354 ident: CR33 article-title: A novel trust-based privacy preservation framework for service handling via ontology service ranking publication-title: Wireless Personal Communications doi: 10.1007/s11277-020-07105-8 – volume: 28 start-page: 287 year: 2022 end-page: 301 ident: CR21 article-title: Cross layered cryptography based secure routing for IoT-enabled smart healthcare system publication-title: Wireless Networks doi: 10.1007/s11276-021-02850-5 – year: 2018 ident: CR5 article-title: A privacy preservation secure cross layer protocol design for IoT based wireless body area networks using ECDSA framework publication-title: Journal of Medical Systems doi: 10.1007/s10916-018-1050-2 – volume: 6 start-page: 10441 issue: 6 year: 2019 end-page: 10457 ident: CR12 article-title: Data provenance for IoT With light weight authentication and privacy preservation publication-title: IEEE Internet of Things Journal doi: 10.1109/JIOT.2019.2939286 – volume: 23 start-page: 79 year: 2017 end-page: 87 ident: CR1 article-title: Privacy preservation and protection for cluster based geographic routing protocol in MANET publication-title: Wireless Networks doi: 10.1007/s11276-015-1135-5 – volume: 124 start-page: 349 year: 2021 end-page: 376 ident: CR20 article-title: Adaptive key management-based cryptographic algorithm for privacy preservation in wireless mobile adhoc networks for IoT applications publication-title: Wireless Personal Communications – volume: 67 start-page: 553 year: 2018 end-page: 575 ident: CR25 article-title: ESOT: A new privacy model for preserving location privacy in internet of things publication-title: Telecommunication Systems doi: 10.1007/s11235-017-0352-x – year: 2021 ident: CR27 article-title: Literature review on network security in wireless mobile Ad-hoc network for IoT applications: network attacks and detection mechanisms publication-title: International Journal of Intelligent Unmanned Systems doi: 10.1108/ijius-05-2021-0028 – year: 2020 ident: CR31 article-title: An efficient group signcryption scheme supporting batch verification for securing transmitted data in the Internet of Things publication-title: Journal of Ambient Intelligence and Humanized Computing doi: 10.1007/s12652-020-02076-x – volume: 16 start-page: 7765 issue: 12 year: 2020 end-page: 7773 ident: CR10 article-title: Privacy preservation in industrial IoT via fast adaptive correlation matrix completion publication-title: IEEE Transactions on Industrial Informatics doi: 10.1109/TII.2019.2960275 – volume: 45 start-page: 10949 year: 2020 end-page: 10974 ident: CR36 article-title: Modified Harris Hawks optimization algorithm for global optimization problems publication-title: Arabian Journal for Science and Engineering doi: 10.1007/s13369-020-04896-7 – volume: 20 start-page: 849 issue: 6 year: 2021 end-page: 869 ident: CR24 article-title: Continuous improvement process (CIP)-based privacy-preserving framework for smart connected toys publication-title: International Journal of Information Security. doi: 10.1007/s10207-020-00535-2 – volume: 25 start-page: 713 year: 2020 end-page: 724 ident: CR26 article-title: Joint optimization of resource utilization and load balance with privacy preservation for edge services in 5G networks publication-title: Mobile Networks and Applications doi: 10.1007/s11036-019-01448-8 – year: 2021 ident: CR7 article-title: An optimal metaheuristic optimization based ElGamal public key cryptosystem for privacy in IoT environment publication-title: International Journal of System Assurance Engineering and Management doi: 10.1007/s13198-021-01173-0 – volume: 7 start-page: 2622 issue: 4 year: 2020 end-page: 2629 ident: CR13 article-title: Joint optimization of offloading utility and privacy for edge computing enabled IoT publication-title: IEEE Internet of Things Journal doi: 10.1109/JIOT.2019.2944007 – volume: 122 start-page: 3019 issue: 4 year: 2022 end-page: 3051 ident: CR35 article-title: Madhavi Tatineni "adaptive deep learning strategy with red deer algorithm for sparse channel estimation and hybrid precoding in millimeter wave massive MIMO-OFDM systems," publication-title: Wireless Personal Communications doi: 10.1007/s11277-021-09039-1 – volume: 75 start-page: 8231 year: 2019 end-page: 8261 ident: CR3 article-title: A privacy-preserving code-based authentication protocol for Internet of Things publication-title: The Journal of Supercomputing doi: 10.1007/s11227-019-03003-4 – volume: 185 start-page: 107743 year: 2021 ident: 2986_CR2 publication-title: Computer Networks doi: 10.1016/j.comnet.2020.107743 – volume: 23 start-page: 79 year: 2017 ident: 2986_CR1 publication-title: Wireless Networks doi: 10.1007/s11276-015-1135-5 – volume: 12 start-page: 480 year: 2021 ident: 2986_CR37 publication-title: International Journal of System Assurance Engineering and Management – volume: 45 start-page: 10949 year: 2020 ident: 2986_CR36 publication-title: Arabian Journal for Science and Engineering doi: 10.1007/s13369-020-04896-7 – volume: 112 start-page: 1339 year: 2020 ident: 2986_CR33 publication-title: Wireless Personal Communications doi: 10.1007/s11277-020-07105-8 – volume: 23 start-page: 2579 year: 2020 ident: 2986_CR30 publication-title: Cluster Computing doi: 10.1007/s10586-019-03028-7 – volume: 8 start-page: 81698 year: 2020 ident: 2986_CR9 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2990932 – volume: 11 start-page: 395 issue: 11 year: 2019 ident: 2986_CR34 publication-title: Journal of Advanced Research in Dynamical and Control Systems – volume: 122 start-page: 3019 issue: 4 year: 2022 ident: 2986_CR35 publication-title: Wireless Personal Communications doi: 10.1007/s11277-021-09039-1 – volume: 18 start-page: 1 issue: 1 year: 2021 ident: 2986_CR11 publication-title: ACM Journal on Emerging Technologies in Computing Systems (JETC) – volume: 20 start-page: 849 issue: 6 year: 2021 ident: 2986_CR24 publication-title: International Journal of Information Security. doi: 10.1007/s10207-020-00535-2 – volume: 25 start-page: 30 year: 2018 ident: 2986_CR17 publication-title: International Journal of Wireless Information Networks doi: 10.1007/s10776-017-0373-0 – volume: 97 year: 2020 ident: 2986_CR23 publication-title: Ad Hoc Networks doi: 10.1016/j.adhoc.2019.102022 – volume: 98 start-page: 1383 year: 2018 ident: 2986_CR18 publication-title: Wireless Personal Communications doi: 10.1007/s11277-017-4923-7 – volume: 6 start-page: 10441 issue: 6 year: 2019 ident: 2986_CR12 publication-title: IEEE Internet of Things Journal doi: 10.1109/JIOT.2019.2939286 – volume: 16 start-page: 7765 issue: 12 year: 2020 ident: 2986_CR10 publication-title: IEEE Transactions on Industrial Informatics doi: 10.1109/TII.2019.2960275 – volume: 21 start-page: 7793 issue: 23 year: 2021 ident: 2986_CR22 publication-title: Sensors doi: 10.3390/s21237793 – volume: 75 start-page: 8231 year: 2019 ident: 2986_CR3 publication-title: The Journal of Supercomputing doi: 10.1007/s11227-019-03003-4 – volume: 7 start-page: 2622 issue: 4 year: 2020 ident: 2986_CR13 publication-title: IEEE Internet of Things Journal doi: 10.1109/JIOT.2019.2944007 – year: 2021 ident: 2986_CR27 publication-title: International Journal of Intelligent Unmanned Systems doi: 10.1108/ijius-05-2021-0028 – year: 2020 ident: 2986_CR31 publication-title: Journal of Ambient Intelligence and Humanized Computing doi: 10.1007/s12652-020-02076-x – volume: 97 start-page: 4063 year: 2017 ident: 2986_CR16 publication-title: Wireless Personal Communications doi: 10.1007/s11277-017-4713-2 – volume: 78 start-page: 25487 year: 2019 ident: 2986_CR15 publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-019-7617-1 – volume: 122 start-page: 3019 issue: 4 year: 2021 ident: 2986_CR28 publication-title: Wireless Personal Communications. doi: 10.1007/s11277-021-09039-1 – ident: 2986_CR29 doi: 10.1109/ETI4.051663.2021.9619420 – volume: 113 start-page: 747 year: 2020 ident: 2986_CR32 publication-title: Wireless Personal Communications doi: 10.1007/s11277-020-07251-z – volume: 7 start-page: 2323 issue: 4 year: 2020 ident: 2986_CR14 publication-title: IEEE Transactions on Network Science and Engineering doi: 10.1109/TNSE.2020.2970767 – volume: 123 start-page: 1 year: 2021 ident: 2986_CR8 publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2021.01.028 – volume: 25 start-page: 713 year: 2020 ident: 2986_CR26 publication-title: Mobile Networks and Applications doi: 10.1007/s11036-019-01448-8 – volume: 14 start-page: 821 year: 2021 ident: 2986_CR6 publication-title: Peer-to-Peer Networking and Applications doi: 10.1007/s12083-020-01038-6 – ident: 2986_CR39 doi: 10.1109/CAOL46282.2019.9019583 – volume: 66 start-page: 888 year: 2013 ident: 2986_CR19 publication-title: The Journal of Supercomputing doi: 10.1007/s11227-013-0920-0 – year: 2018 ident: 2986_CR5 publication-title: Journal of Medical Systems doi: 10.1007/s10916-018-1050-2 – year: 2021 ident: 2986_CR7 publication-title: International Journal of System Assurance Engineering and Management doi: 10.1007/s13198-021-01173-0 – volume: 124 start-page: 349 year: 2021 ident: 2986_CR20 publication-title: Wireless Personal Communications – volume: 67 start-page: 553 year: 2018 ident: 2986_CR25 publication-title: Telecommunication Systems doi: 10.1007/s11235-017-0352-x – volume: 8 start-page: 83548 year: 2020 ident: 2986_CR38 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2991543 – volume: 44 start-page: 58 year: 2018 ident: 2986_CR4 publication-title: Pervasive and Mobile Computing doi: 10.1016/j.pmcj.2018.01.006 – volume: 28 start-page: 287 year: 2022 ident: 2986_CR21 publication-title: Wireless Networks doi: 10.1007/s11276-021-02850-5 |
| SSID | ssj0008399 |
| Score | 2.3487499 |
| Snippet | Mobile Ad-Hoc Networks (MANETs) are useful and appropriate, especially for complex scenarios, including law, military enforcement as well disaster recovery,... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 2713 |
| SubjectTerms | Algorithms Chaos theory Communications Engineering Computer Communication Networks Cryptography Electrical Engineering Encryption Engineering Heuristic methods Internet of Things IT in Business Mobile ad hoc networks Networks Optimization Original Paper Performance evaluation Privacy Rescue operations Statistical analysis Wireless networks |
| SummonAdditionalLinks | – databaseName: Science Database dbid: M2P link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwELagMMDAG1FeuoENLBLn4XhCFaKCgYqhSGyR4zgUUZrShlZd-eX4UqcFJLow27Ecfee7s-_uO0LOmJIKeddoJjDMyByPJj4XVIswc41J537ql80meKsVPT2JB_vgNrRplZVOLBV1mit8I79kYYSxRydkV_13il2jMLpqW2gskxXj2biY0nXPHmaa2Bh_UUY7zYULQ2C2aGZaOucyjum3ZoSJKKSTn4Zp7m3-CpCWdqe5-d8db5EN63FCYyoi22RJ93bI-jcewl3yeTcj5izA7GMk1QQwQ7Z6sQW0c0XehZceILlx1-hHuG-0btpgnF64y9vwPRIOmE3_DJ0JloOB-d8xTE8U7ciB0SrQkePXIeRGXb3ZOtA98ti8aV_fUtucgSpzYyuoAVEEIpUi8yLNhfQdnQqsBBZKhhnTxvI5qStlkOjAUUkayiRxPel7jpCBrz1vn9R6eU8fEIhSxrnDdMaD1FdZIJXx8TKtAxFxkURRnbgVMrGyzOXYQKMbzzmXEc3YoBmXaMaTOjmffdOf8nYsnH1cQRjbMzyM5_jVyUUlBPPhv1c7XLzaEVljpdxhFuExqRWDD31CVtWoeBkOTksJ_gLrA_ir priority: 102 providerName: ProQuest |
| Title | Intelligent privacy preservation proctol in wireless MANET for IoT applications using hybrid crow search-harris hawks optimization |
| URI | https://link.springer.com/article/10.1007/s11276-022-02986-y https://www.proquest.com/docview/2680446062 |
| Volume | 28 |
| WOSCitedRecordID | wos000801195100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1572-8196 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0008399 issn: 1022-0038 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3db9MwED-xjQd44BvRsVX3wBtYcpwP24_b1Gl7aFWVAoWXyHGcdaK0qM029ZW_fL40acs0kODFUhTHSnz2_c65u98BvBPWWOJdY4UmN6PgIcsiqZnTSRF4SJdRHlXFJmSvp0Yj3a-TwhZNtHvjkqw09SbZLRCSAmYFI9rwhC13YM_DnaKCDYOPn9f610O-rnyc1JOHqk6VuX-M3-FoY2PecYtWaHP69P_e8xk8qa1LPFoth-fwwE1fwOMtzsGX8Ot8TcJZoh_52tglUjRs83cWCdPK2QQvp0hExhOvC7F71OsM0Ru4eD4b4rbXGyly_gLHS0r9Qv-VN7jaPWxs5l6D4NjcfF_gzKumH3XO5yv4dNoZnpyxuhADs_50VjIvMB3r3OgiVE5qE3GXa8r61dYkhXAe5XgeGBNnLuY2yxOTZUFoopBrE0cuDF_D7nQ2dW8AVS6k5MIVMs4jW8TGenuucC7WSupMqRYEjTxSW7OUU7GMSbrhV6b5Tf38ptX8pssWvF8_83PF0fHX3geNmNN6vy5SkSjybPNEtOBDI9bN7T-Ptv9v3d_CI1GtDIogPIDdcn7lDuGhvS4vF_M27MgvX9uwd9zp9Qf-qstPqBV93_bjb-1qnd8C71f1Cw |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9QwEB1VBQl64Bt1aYE5wAksEm8SxweEKmjVVdtVD4vUW3Ach6263ZTdtKtc-UH8RmbysVuQ6K0Hzk4c2Xl-Hntm3gC8kdZY1l0TuWY3o_T6Ig2UFk5HuU9bugqyoC42oYbD-OREH6_Bry4XhsMqO06siTorLN-Rf5BRzL5HL5KfLn4IrhrF3tWuhEYDiwNXLejINv84-EL_962Ue7ujz_uirSogLB01SkFf16HOjM77sVPaBJ7LNKewamuiXDqibC_zjQlTF3o2zSKTpn7fBH1PmzBwfAFKlH8nYGUxDhWUx0vmJ2ND195VOuCxy61N0mlS9XypONyXWqSOI1H9uRGurNu_HLL1Prf38H-boUfwoLWocadZAo9hzU2fwMY1ncWn8HOwFB4tkcZ9ZWyFHAHc3Ugj7-NlMcHTKbJ484T4H492hrsjJKMeB8UIr3v6kbMFvuO44nQ3pPldYDNwMTYzYk0cm8XZHAui4_M2z_UZfL2VSXgO69Ni6jYB40wq5UmXqzALbB4aSzZs7lyoY6XTOO6B3yEhsa0yOxcImSQrTWlGT0LoSWr0JFUP3i3fuWh0SW58eruDTNJy1DxZ4aUH7zvQrZr_3duLm3t7Dff2R0eHyeFgeLAF92WNeY6Y3Ib1cnbpXsJde1Wezmev6tWD8O22wfgbmYZWTQ |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB5VBSF64I0IFJgDnGBVe2N7vQeEKtqIqBDlEKSKi1mv16QijUtiGvnKz-LXMeNHUpDorQfOtlf2-Nt57Mx8A_BCWmOZd03kmtOM0uuLNFBaOB3lPpl0FWRBPWxCjUbx8bEeb8GvrheGyyo7nVgr6qywfEa-J6OYc49eJPfytixifDB4e_Zd8AQpzrR24zQaiBy5akXh2_LN8ID-9UspB4eTd-9FO2FAWAo7SkFvokOdGZ33Y6e0CTyXaW5n1dZEuXSkvr3MNyZMXejZNItMmvp9E_Q9bcLA8WEoqf9rimJMLicch5_XVoAcD11nWinY4_Rb27DTtO35UnHpL12ROo5E9adR3Hi6fyVna5s3uP0_S-sO3Go9bdxvtsZd2HLze7BzgX_xPvwcrglJSyQZnBtbIVcGdyfVyPa9LGZ4MkcmdZ6RXcCP-6PDCZKzj8NighcrAJC7CL7itOI2OCRZr7D5cDE1C9KmODWrb0ssSE2ftv2vD-DTlQjhIWzPi7l7BBhnUilPulyFWWDz0FjybXPnQh0rncZxD_wOFYltGdt5cMgs2XBNM5ISQlJSIympevBq_cxZw1dy6d27HXySVnctkw12evC6A-Dm8r9Xe3z5as_hBmEw-TAcHT2Bm7KGPxdS7sJ2ufjhnsJ1e16eLBfP6o2E8OWqsfgbWctfOQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Intelligent+privacy+preservation+proctol+in+wireless+MANET+for+IoT+applications+using+hybrid+crow+search-harris+hawks+optimization&rft.jtitle=Wireless+networks&rft.au=Pamarthi%2C+Satyanarayana&rft.au=Narmadha%2C+R.&rft.date=2022-08-01&rft.issn=1022-0038&rft.eissn=1572-8196&rft.volume=28&rft.issue=6&rft.spage=2713&rft.epage=2729&rft_id=info:doi/10.1007%2Fs11276-022-02986-y&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11276_022_02986_y |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1022-0038&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1022-0038&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1022-0038&client=summon |